2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

筛选
英文 中文
Vehicle detection using acoustic signatures 利用声学特征进行车辆检测
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229975
M. Uttarakumari, A. S. Koushik, Anirudh S Raghavendra, Akshay Adiga, P. Harshita
{"title":"Vehicle detection using acoustic signatures","authors":"M. Uttarakumari, A. S. Koushik, Anirudh S Raghavendra, Akshay Adiga, P. Harshita","doi":"10.1109/CCAA.2017.8229975","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229975","url":null,"abstract":"This paper deals with the problem of classification of vehicles based on their acoustic signatures. Each type of vehicle transmits a particular type of engine sound, which can be used as a basis of classification. The samples are first collected using a reliable recording device. The signals so obtained are de-noised using wavelet analysis. The frames to be analyzed are selected using a unique energy index method. The prominent features of the obtained frame are then extracted. A novel feature selection method based on mean and variance is used to select the required features for analysis. The paper then focuses on a fast and potent method for classification of vehicles using k-nearest neighbours algorithm (kNN) into three categories: Two wheelers, four wheelers and Heavy Transport Vehicles (HTVs). Thus the method achieves its required results by using expeditive algorithms.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89083348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prevention of illegal distribution line tappings 防止非法抽打配电线路
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230035
Sheikh Suhail Mohammad, Auqib Ahmed Dar, Peerzada Aamir Javaid, P. Ranjan
{"title":"Prevention of illegal distribution line tappings","authors":"Sheikh Suhail Mohammad, Auqib Ahmed Dar, Peerzada Aamir Javaid, P. Ranjan","doi":"10.1109/CCAA.2017.8230035","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230035","url":null,"abstract":"Power theft is one of the major concerns of many developing countries including India. The state of Jammu and Kashmir is one of the worst affected states of India, having about 50% of transmission and distribution losses. The proposed work is an attempt to stop the losses by preventing the power theft, using encoding and decoding techniques of the analog signal. Encoding is done at the distribution transformer and the decoding circuit is incorporated within the smart electrical energy meter. The power line between the distribution transformer and the energy meter is protected as encoded power flows through it which cannot be used for running the home appliances, therefore providing protection against illegal distribution line tapping's. The proposed system is developed using Simulink.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88904847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher 遗传算法在单字母替代密码分析中的应用
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229834
Piyush Kumar Mudgal, Rajesh Purohit, Rajesh D. Sharma, Mahendra Kumar Jangir
{"title":"Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher","authors":"Piyush Kumar Mudgal, Rajesh Purohit, Rajesh D. Sharma, Mahendra Kumar Jangir","doi":"10.1109/CCAA.2017.8229834","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229834","url":null,"abstract":"Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection-random with elitism, roulette wheel and tournament options are used, for crossover — 1-point, 2-point and Uniform options are used, with interchanging mutation.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79605043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cause effect testing of flu in medical sciences 医学上流感的因果检验
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229769
Nishant Mathur, Reema Ajmera, J. Yadav
{"title":"Cause effect testing of flu in medical sciences","authors":"Nishant Mathur, Reema Ajmera, J. Yadav","doi":"10.1109/CCAA.2017.8229769","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229769","url":null,"abstract":"Now day's technology improves our living standards and life style and makes many things easier for us. But is the technology creates a gap between human and daily life routine which affects human body and their health and makes them sick so often. Using this approach we are proposed a basic model and try to find out various reasons by which Flu spreads among us and so often. With the help of data mining algorithms first do the analysis of the data which you provide, and find out the specific patterns. The algorithm uses the result of the analysis of data over much iteration to find optimal parameters for creating the mining model and using these parameters for finding out the details about different statistics and patterns which can came out while applying data mining technique on the data set.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84621026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triboelectric nanogenerator based on vertical contact separation mode for energy harvesting 基于垂直接触分离方式的能量收集摩擦纳米发电机
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230037
Khushboo, Puneet Azad
{"title":"Triboelectric nanogenerator based on vertical contact separation mode for energy harvesting","authors":"Khushboo, Puneet Azad","doi":"10.1109/CCAA.2017.8230037","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230037","url":null,"abstract":"Triboelectric effect works on the principle of triboelectrification and electrostatic induction. This principle is used to generate voltage by converting mechanical energy into electrical energy. This paper presents the charging behavior of different capacitors by rubbing of two different materials using mechanical motion. The numerical and simulation modeling, describes the charging performance of a TENG with a bridge rectifier. It is also demonstrated that a 10 μF capacitor can be charged to a maximum of 24.04 volt in 300 seconds and it is also provide 2800 μJ/cm3 maximum energy density. Such system can be used for ultralow power electronic devices, biomedical devices and self-powered appliances etc.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89368570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An advanced AES algorithm using swap and 400 bit data block with flexible S-Box in Cloud Computing 云计算中采用交换和400位数据块的一种先进的AES算法
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229888
C. P. Pramod, Manjit Jaiswal
{"title":"An advanced AES algorithm using swap and 400 bit data block with flexible S-Box in Cloud Computing","authors":"C. P. Pramod, Manjit Jaiswal","doi":"10.1109/CCAA.2017.8229888","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229888","url":null,"abstract":"This paper suggests a new Advance Encryption Standard (AES) encryption technique. New Algorithm uses 400 bit block encryption scheme and a key dependent rotated S-Box which varies according to the 200 bit key provided by the user. Fixed S-box allows hackers to study S-box and find weaker points, whereas using key-dependent S-Box, it is harder for attacker to do any offline analysis of an attack on one particular set of S-boxes. This helps to store data in cloud securely and to transfer data without any obstruction or modification in Cloud Computing and big data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87226795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel polarization independent triple bandstop frequency selective surface for the mobile and wireless communication 一种用于移动和无线通信的新型极化无关三带阻频率选择表面
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230042
Monika Garg, Rekha Chahar, S. Yadav, Shweta Garg, D. Noor
{"title":"A novel polarization independent triple bandstop frequency selective surface for the mobile and wireless communication","authors":"Monika Garg, Rekha Chahar, S. Yadav, Shweta Garg, D. Noor","doi":"10.1109/CCAA.2017.8230042","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230042","url":null,"abstract":"In this paper, a novel and stable frequency selective surface has been proposed. The proposed design has incorporated a single sided FR-4 substrate with one square and two-crossed shaped loops which led to triple band reject (1.8 GHz, 2.5 GHz and 3.5 GHz) characteristics. The FR-4 substrate has a dielectric constant of 4.4 with loss tangent of 0.02 and dimension of 0.12 λ × 0.12 λ. The projected FSS design is polarization independent due to symmetrical structure. Therefore, it has produced a stable resonant frequency response at normal and oblique angles of incidences for both perpendicular TE and parallel TM wave modes. This stability of designed FSS has verified by its simulated results and realized in CST Microwave studio in frequency domain solver based on FDTD method. The transmission and reflection characteristics have analyzed at the selected band-stop/notch frequencies 1.8 GHz, 2.5 GHz and 3.5 GHz. More importantly, the proposed FSS is well suited to electromagnetic shielding in mobile and wireless indoor applications covering a wide spectrum with wider employability.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86947891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of hybrid & non-hybrid approaches in digital image analysis 数字图像分析中混合与非混合方法的性能分析
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229948
Mohammad Shahnawaz, R. Dwivedi
{"title":"Performance analysis of hybrid & non-hybrid approaches in digital image analysis","authors":"Mohammad Shahnawaz, R. Dwivedi","doi":"10.1109/CCAA.2017.8229948","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229948","url":null,"abstract":"In this paper general study on performance analysis like Entropy, Correlation, Execution time, Histograme etc are discussed. On the basis of this study a model on digital image analysis will propose which is also using hybrid & non-hybrid approaches like Fuzzy c-means (FCM), Possibilistic c-means (PCM).","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82012214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indirect mutual trust for third party proving data stored in distributed-cloud storage 间接相互信任第三方证明数据存储在分布式云存储
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229870
M. Saleem, Mohd Naqeeb, Abdul Quyoom, Mudasser Nazar
{"title":"Indirect mutual trust for third party proving data stored in distributed-cloud storage","authors":"M. Saleem, Mohd Naqeeb, Abdul Quyoom, Mudasser Nazar","doi":"10.1109/CCAA.2017.8229870","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229870","url":null,"abstract":"Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional framework and security model are specified. Taking into account the bilinear pairings, a solid ID-DPDP model is planned. The proposed ID-DPDP model is provably secure under the hardness suspicion of the standard CDH (computational Deffie-Hellman) issue. Notwithstanding the auxiliary favourable position of end of authentication administration, our ID-DPDP protocol is likewise proficient and adaptable. In light of the customer's approval, the proposed ID-DPDP model can understand private confirmation, group check and public verification.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89982462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research directions in the Internet of Every Things(IoET) 物联网(IoET)研究方向
2017 International Conference on Computing, Communication and Automation (ICCCA) Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230008
Prachi Deshpande, B. Iyer
{"title":"Research directions in the Internet of Every Things(IoET)","authors":"Prachi Deshpande, B. Iyer","doi":"10.1109/CCAA.2017.8230008","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230008","url":null,"abstract":"It is believed that technology will take over the day to day life of human begin. No one can remain isolated from the adaptation of technology. Hence it is the need of the hour to introduce a technology which will do the day to day life tasks in human life with smart and intelligent way. Hence, this paper critically discuss the emergence and progress of Internet of Every Things (IoET) as the next generation communication tool. Further, the various research avenues and open challenges in the area of IoET are discussed in detail.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89584769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信